WordPress 4.3-4.7 - Remote Code Execution (RCE) in PHPMailer

Sign up to our free email alerts service for instant vulnerability notifications!

Affects WordPresses

fixed in version 4.7.1
fixed in version 4.6.2
fixed in version 4.7.1
fixed in version 4.5.5
fixed in version 4.5.5
fixed in version 4.5.5
fixed in version 4.5.5
fixed in version 4.5.5
fixed in version 4.7.1
fixed in version 4.4.6
fixed in version 4.4.6
fixed in version 4.4.6
fixed in version 4.4.6
fixed in version 4.4.6
fixed in version 4.4.6
fixed in version 4.4.6
fixed in version 4.3.7
fixed in version 4.3.7
fixed in version 4.3.7
fixed in version 4.3.7
fixed in version 4.3.7
fixed in version 4.3.7
fixed in version 4.3.7
fixed in version 4.3.7

References

METASPLOIT exploit/unix/webapp/wp_phpmailer_host_header
URL https://github.com/WordPress/WordPress/commit/24767c76d359231642b0ab48437b64e8c6c7f491
URL http://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html
URL https://www.wordfence.com/blog/2016/12/phpmailer-vulnerability/
URL https://github.com/PHPMailer/PHPMailer/wiki/About-the-CVE-2016-10033-and-CVE-2016-10045-vulnerabilities
URL https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/

Classification

Type RCE
OWASP Top 10 A1: Injection
CWE CWE-94

Miscellaneous

Submitter ethicalhack3r
Submitter Website https://dewhurstsecurity.com/
Submitter Twitter ethicalhack3r
Views 5472
Verified No
WPVDB ID 8714

Timeline

Publicly Published 2017-01-11 (9 months ago)
Added 2017-01-12 (9 months ago)
Last Updated 2017-05-17 (5 months ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.